default search action
Hidenori Kuwakado
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Shoichi Hirose, Hidenori Kuwakado:
Quantum Collision Resistance of Double-Block-Length Hashing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(9): 1478-1487 (2024) - 2021
- [j23]Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida:
Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model. IEICE Trans. Inf. Syst. 104-D(11): 1894-1901 (2021) - [c18]Shoichi Hirose, Hidenori Kuwakado:
A Note on Quantum Collision Resistance of Double-Block-Length Compression Functions. IMACC 2021: 161-175 - [i6]Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo:
White-Box Encryption Scheme Using a Quantum Memory. IACR Cryptol. ePrint Arch. 2021: 589 (2021)
2010 – 2019
- 2019
- [c17]Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida:
Authenticated Encryption Based on Lesamnta-LW Hashing Mode. ICISC 2019: 52-69 - 2018
- [j22]Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida:
A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 110-118 (2018) - [c16]Hidenori Kuwakado:
Secret Sharing Schemes Using Modulo-$2^{m}$ Arithmetic Operations. DSC 2018: 1-7 - [c15]Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo:
Parallelizable Message Preprocessing for Merkle-Damgård Hash Functions. ISITA 2018: 457-461 - 2017
- [j21]Hidenori Kuwakado, Masazumi Kurihara:
Secure Regenerating Codes Using Linear Regenerating Codes and the All-or-Nothing Transform. IEICE Trans. Inf. Syst. 100-D(3): 483-495 (2017) - 2016
- [j20]Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji:
A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 14-21 (2016) - 2014
- [c14]Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji:
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256. ICISC 2014: 271-285 - [c13]Hidenori Kuwakado, Masazumi Kurihara:
Secure regenerating codes using linear MBR/MSR codes and the all-or-nothing transform. ISITA 2014: 221-225 - [c12]Shoichi Hirose, Hidenori Kuwakado:
A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function. ProvSec 2014: 71-86 - [c11]Shoichi Hirose, Hidenori Kuwakado:
Forward-Secure Sequential Aggregate Message Authentication Revisited. ProvSec 2014: 87-102 - 2013
- [j19]Masazumi Kurihara, Hidenori Kuwakado:
Secure Regenerating Codes Based on Rashmi-Shah-Kumar MBR Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(2): 635-648 (2013) - [j18]Hidenori Kuwakado, Shoichi Hirose:
Multilane Hashing Mode Suitable for Parallel Processing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12): 2434-2442 (2013) - [c10]Hidenori Kuwakado, Shoichi Hirose:
Hashing Mode Using a Lightweight Blockcipher. IMACC 2013: 213-231 - [c9]Shoichi Hirose, Hidenori Kuwakado:
Redactable Signature Scheme for Tree-structured Data based on Merkle Tree. SECRYPT 2013: 313-320 - [i5]Masazumi Kurihara, Hidenori Kuwakado:
Generalization of Rashmi-Shah-Kumar Minimum-Storage-Regenerating Codes. CoRR abs/1309.6701 (2013) - 2012
- [j17]Shoichi Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel, Hirotaka Yoshida:
An AES Based 256-bit Hash Function for Lightweight Applications: Lesamnta-LW. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 89-99 (2012) - [j16]Shoichi Hirose, Hidenori Kuwakado:
Collision Resistance of Hash Functions in a Weak Ideal Cipher Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 252-255 (2012) - [j15]Hidenori Kuwakado:
Length-preserving CBC Enciphering Scheme and Its Security Analysis. Inf. Media Technol. 7(4): 1450-1456 (2012) - [j14]Hidenori Kuwakado:
Length-preserving CBC Enciphering Scheme and Its Security Analysis. J. Inf. Process. 20(4): 854-860 (2012) - [c8]Masazumi Kurihara, Hidenori Kuwakado:
Secret sharing schemes based on minimum bandwidth regenerating codes. ISITA 2012: 255-259 - [c7]Hidenori Kuwakado, Masakatu Morii:
Security on the quantum-type Even-Mansour cipher. ISITA 2012: 312-316 - 2011
- [j13]Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii:
Generalized Classes of Weak Keys on RC4 Using Predictive State. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 10-18 (2011) - [c6]Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida:
Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing. ICISC 2011: 346-364 - 2010
- [j12]Ryoichi Teramura, Yasuo Asakura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii:
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 164-171 (2010) - [c5]Shoichi Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel, Hirotaka Yoshida:
A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW. ICISC 2010: 151-168 - [c4]Hidenori Kuwakado, Masakatu Morii:
Quantum distinguisher between the 3-round Feistel cipher and the random permutation. ISIT 2010: 2682-2685
2000 – 2009
- 2009
- [j11]Hidenori Kuwakado, Shoichi Hirose:
Differentiability of four prefix-free PGV hash functions. IEICE Electron. Express 6(13): 955-958 (2009) - [j10]Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii:
A Chosen-IV Key Recovery Attack on Py and Pypy. IEICE Trans. Inf. Syst. 92-D(1): 32-40 (2009) - [j9]Shoichi Hirose, Hidenori Kuwakado:
Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2447-2453 (2009) - 2008
- [j8]Hidenori Kuwakado, Masakatu Morii:
Compression Functions Suitable for the Multi-Property-Preserving Transform. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 2851-2859 (2008) - [c3]Shoichi Hirose, Hidenori Kuwakado:
A Scheme to Base a Hash Function on a Block Cipher. Selected Areas in Cryptography 2008: 262-275 - [c2]Hidenori Kuwakado, Shoichi Hirose:
Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. WISA 2008: 174-189 - [i4]Hidehiko Nakagami, Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii:
A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2. IACR Cryptol. ePrint Arch. 2008: 128 (2008) - 2007
- [j7]Hidenori Kuwakado, Masakatu Morii:
Indifferentiability of Single-Block-Length and Rate-1 Compression Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(10): 2301-2308 (2007) - [i3]Hidenori Kuwakado, Masakatu Morii:
Compression Functions Suitable for the Multi-Property-Preserving Transform. IACR Cryptol. ePrint Arch. 2007: 302 (2007) - 2006
- [j6]Hidenori Kuwakado, Hatsukazu Tanaka:
Secure Length-Preserving All-or-Nothing Transform. Inf. Media Technol. 1(1): 112-120 (2006) - [i2]Yuto Nakano, Hidenori Kuwakado, Masakatu Morii:
Redundancy of the Wang-Yu Sufficient Conditions. IACR Cryptol. ePrint Arch. 2006: 406 (2006) - [i1]Hidenori Kuwakado, Masakatu Morii:
Indifferentiability of Single-Block-Length and Rate-1 Compression Functions. IACR Cryptol. ePrint Arch. 2006: 485 (2006) - 2005
- [c1]Hidenori Kuwakado, Masakatu Morii, Hatsukazu Tanaka:
Visual Cryptographic Protocols Using the Trusted Initializer. ICICS 2005: 112-122 - 2003
- [j5]Hidenori Kuwakado, Hatsukazu Tanaka:
Transitive Signature Scheme for Directed Trees. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(5): 1120-1126 (2003) - [j4]Yuichi Igarashi, Hidenori Kuwakado, Hatsukazu Tanaka:
Efficient Relative Time-Stamping Scheme Based on the Ternary Link. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(10): 2552-2559 (2003) - 2002
- [j3]Hidenori Kuwakado, Hatsukazu Tanaka:
Message Authentication for Stream. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 190-193 (2002) - [j2]Hidenori Kuwakado, Hatsukazu Tanaka:
All-or-Nothing Transform Based on a Linear Code. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(5): 1084-1087 (2002) - [j1]Hidenori Kuwakado, Hatsukazu Tanaka:
Polynomial Representation of a Visual Secret Sharing Scheme and Its Application. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(6): 1379-1386 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint